{"id":505,"date":"2025-07-29T02:56:04","date_gmt":"2025-07-29T02:56:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jprosser91\/?page_id=505"},"modified":"2025-08-11T01:28:21","modified_gmt":"2025-08-11T01:28:21","slug":"cs-464","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jprosser91\/cs-464\/","title":{"rendered":"CS 464"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><strong>Networked Systems Security<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Course Description<\/h2>\n\n\n\n<p>This course introduces students to global information systems. It exposes students to the issues of doing global business in a technological world. There will be a general focus on the use of technology to facilitate the practice of global business in the enterprise. A key outcome of the course should be an understanding of the uses of systems and technology to gain and sustain competitive advantage for global companies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Assignments<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">AH Datapacket<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"761\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_datapacket.drawio.png?resize=740%2C761&#038;ssl=1\" alt=\"\" class=\"wp-image-823\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_datapacket.drawio.png?w=740&amp;ssl=1 740w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_datapacket.drawio.png?resize=292%2C300&amp;ssl=1 292w\" sizes=\"(max-width: 740px) 100vw, 740px\" data-recalc-dims=\"1\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">ESP Datapacket<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"898\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_ESP_datapacket.drawio.png?resize=1000%2C898&#038;ssl=1\" alt=\"\" class=\"wp-image-824\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_ESP_datapacket.drawio.png?w=1010&amp;ssl=1 1010w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_ESP_datapacket.drawio.png?resize=300%2C269&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_ESP_datapacket.drawio.png?resize=768%2C690&amp;ssl=1 768w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/HW8_AH_ESP_datapacket.drawio.png?resize=334%2C300&amp;ssl=1 334w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Capsulation<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"906\" height=\"972\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/12-diagram.drawio.png?resize=906%2C972&#038;ssl=1\" alt=\"\" class=\"wp-image-825\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/12-diagram.drawio.png?w=906&amp;ssl=1 906w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/12-diagram.drawio.png?resize=280%2C300&amp;ssl=1 280w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/12-diagram.drawio.png?resize=768%2C824&amp;ssl=1 768w\" sizes=\"(max-width: 906px) 100vw, 906px\" data-recalc-dims=\"1\" \/><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Networked Systems Security Course Description This course introduces students to global information systems. It exposes students to the issues of doing global business in a technological world. There will be a general focus on the use of technology to facilitate the practice of global business in the enterprise. A key outcome of the course should&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/cs-464\/\">Read More<\/a><\/div>\n","protected":false},"author":22978,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":527,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-425\/","url_meta":{"origin":505,"position":0},"title":"IT 425","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Information Systems for International Business Course Description This course introduces students to global information systems. It exposes students to the issues of doingglobal business in a technological world. There will be a general focus on the use of technology tofacilitate the practice of global business in the enterprise. A key\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":525,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-363\/","url_meta":{"origin":505,"position":1},"title":"IT 363","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"SYSTEMS ANALYSIS & DESIGN Course Description This course provides an introduction to the analysis and design of information systems. Emphasis is placed upon the development of requirements that serve the business needs as well as the design of information systems. This course focus on the object-oriented approach of system analysis\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":133,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-cyse-200t-2\/","url_meta":{"origin":505,"position":2},"title":"CYSE 200T","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Cybersecurity, Technology, and Society Students in IT\/CYSE 200T explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":671,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-201\/","url_meta":{"origin":505,"position":3},"title":"IT 201","author":"jpros004","date":"July 31, 2025","format":false,"excerpt":"Introduction to Information Systems Course Description: Lecture 3 hours; 3 credits. An introduction to the major hardware\/software components of modern information systems. Topics include introduction to the history of computers, numbering systems conversion, system and application software, networks and the Internet. Additional topics include Information Systems and Systems Development Life\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":517,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-450\/","url_meta":{"origin":505,"position":4},"title":"CYSE 450","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Ethical Hacking and Penetration Testing. This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":516,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-270\/","url_meta":{"origin":505,"position":5},"title":"CYSE 270","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Linux System for Cybersecurity This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems Assignments","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/505"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/users\/22978"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/comments?post=505"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/505\/revisions"}],"predecessor-version":[{"id":827,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/505\/revisions\/827"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/media?parent=505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}